US6540144B1 - Techniques for interfacing a bar code scanner to a PC using a keyboard retransmit protocol - Google Patents
Techniques for interfacing a bar code scanner to a PC using a keyboard retransmit protocol Download PDFInfo
- Publication number
- US6540144B1 US6540144B1 US09/614,356 US61435600A US6540144B1 US 6540144 B1 US6540144 B1 US 6540144B1 US 61435600 A US61435600 A US 61435600A US 6540144 B1 US6540144 B1 US 6540144B1
- Authority
- US
- United States
- Prior art keywords
- keyboard
- bar code
- code scanner
- controller port
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/002—Specific input/output arrangements not covered by G06F3/01 - G06F3/16
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
Definitions
- the invention relates generally to bar code scanners, and more specifically, to techniques for interfacing bar code scanners with computers.
- bar code scanner 108 is connected to a personal computer (PC) 100 keyboard controller port 104 and a computer keyboard 110 in an Y or wedge type configuration.
- Bar code scanner 108 may contain an on-board processor 109 .
- PC 100 also contains a processor 101 .
- the Y or wedge type configuration is implemented using interconnection cable 106 such that computer keyboard 110 and bar code scanner 108 are placed in parallel across controller port 104 . This parallel configuration is used because keyboard controller 102 circuitry within presently-existing PCs (personal computers) 100 and laptop computers attempts to detect the existence of a computer keyboard 110 connected to the keyboard controller port 104 .
- the controller port 104 needs to be connected to a computer keyboard 110 , even if the keyboard is not to be used for subsequent data entry, and even if the controller port 104 is also connected to an input device other than a computer keyboard. If the keyboard controller 102 circuitry does not detect a keyboard connected to the controller port 104 , the PC 100 and/or laptop may then disable the port, preventing any further inputting of data. In the operational environment of FIG. 1, this disablement poses a problem, because we desire to input further data as bar codes are detected and decoded.
- the keyboard controller port shows great potential as a convenient, somewhat standardized, and readily available data input channel.
- this potential could be advantageously exploited only if it were possible to find some way around the necessity of connecting this port to an actual computer keyboard.
- keyboard-to-PC communications is implemented by means of a 2-way channel. Other types of data must be communicated between the PC and the keyboard in addition to information specifying the key or keys that were pressed.
- a PC When a PC is powered up, the PC is programmed to check for the existence of a primary data input device, which is typically a keyboard. The PC begins a data exchange with the keyboard, and this communication is called “power-on diagnostics”.
- the keyboard is not present, or if the power-on diagnostics fail, the PC will not boot up. Accordingly, if a normal boot-up is desired, the keyboard shown in FIG. 1 should not be eliminated.
- a communication protocol is used to sense the presence of an external keyboard that is connected to the laptop's external keyboard port. If the laptop computer fails to detect a keyboard at the external keyboard port, then the laptop computer may disable its external keyboard port.
- the protocol allows the PC (or laptop) to interrupt the transmitted sequence up through the 9 th bit. Since the 9 th bit can be used to represent all or part of a scan code, the PC will prevent the communication of a scan code if the PC sends out a keyboard port inhibit any time before the 9 th bit is received by the port. If the scan code represents all or part of a decoded bar code, upon issuance of a keyboard controller port interrupt, the PC will prevent the successful receipt of this bar code at the keyboard controller port.
- the computer keyboard will sense this stoppage of communications and retransmit the scan code after the PC releases its halt or inhibit of the keyboard.
- Existing bar code scanners are not so equipped. If a data transmission from a bar code scanner is interrupted, the scanner has no mechanism by which to ascertain whether or not a data entry error has occurred.
- a bar code scanner is equipped with a keyboard emulation mechanism so as to provide an enhanced interface to a keyboard controller port of a computing device such as a personal or laptop computer.
- the keyboard emulation mechanism eliminates the necessity of connecting an actual computer keyboard to the port by responding to the computing device's standard power-on diagnostic procedure as if it were effectively an electrical equivalent of a computer keyboard.
- the keyboard emulation mechanism is equipped to detect a keyboard inhibit signal at the keyboard controller port. This inhibit signal may be generated by the computing device. If the keyboard emulation mechanism detects a keyboard inhibit signal while a data byte is being transmitted to the keyboard controller port, the keyboard emulation mechanism stops transmitting the data byte, waits for the inhibit signal to cease, and then retransmits the data byte to the keyboard controller port. This retransmission process is repeated up to a specified number of times, so as to provide additional opportunities for the data byte to be inputted to the keyboard controller port if the port is momentarily disabled by the keyboard inhibit signal. For many applications, it is advantageous to repeat the retransmission process up to three times for a given data byte. If the data byte is still not successfully received after the third attempt, the process is no longer repeated.
- the keyboard emulation mechanism keeps track of status indications transmitted by the computing device and related to the status of one or more indicators on a computer keyboard. These indicators may be provided in the form of one or more LED lamps indicative of the status of the Caps-lock, Num-lock, and Scroll-lock keys.
- the keyboard emulation mechanism also keeps track of the transmission protocol currently in use, such as make-Break,Make-Only, AT or PS2-type scan-code transmission protocols. These status indications and transmission protocols may vary, depending upon the keyboard country type selected, and are maintained by the keyboard emulation mechanism so that the bar code scanner will transmit accurately to the computing device.
- the keyboard emulation mechanism may be provided in the form of enhanced software, firmware, and/or programming instructions.
- This software, firmware, and/or operating instructions can be configured for use with presently-existing keyboard wedge scanners, as well as any of various scanners which may be developed in the future.
- One purpose of the software, firmware, and/or operating instructions is to accurately transmit a bar code on a transmission line that is subjected to possible halt or inhibit signals issued by the computing device It should be noted that any number of sources contained within the computing device could generate these inhibit signals.
- this byte which may represent all or part of a decoded bar code, is optionally displayed on a monitor coupled to the computing device.
- FIG. 1 is a hardware block diagram showing a bar code scanner to personal computer interface using prior art techniques.
- FIG. 2 is a hardware block diagram showing a bar code scanner to personal computer interface using the techniques of the present invention.
- FIGS. 3A-3K together comprise a flowchart setting forth keyboard emulation techniques according to a preferred embodiment of the invention.
- FIG. 2 is a hardware block diagram showing a bar code scanner to personal computer interface using the techniques of the present invention.
- Enhanced bar code scanner 208 is connected to a keyboard controller port 204 of a personal computer 200 via interconnection cable 206 .
- Keyboard controller port 204 is driven by keyboard controller 202 .
- Interconnection cable 206 is shown for illustrative purposes only, as any other technique for conveying information from one place to another may be used in lieu of, or in addition to, interconnection cable 206 . These techniques may include wireless communication, wired communication, optical communication, and others.
- PC 200 is shown for illustrative purposes, as any of a variety of computing devices may be employed in lieu of, or in addition to, PC 200 .
- PC 200 includes a processor 205 .
- Enhanced bar code scanner 208 may contain an on-board processor 209 .
- a computer keyboard 110 need not be employed to perform the keyboard emulation techniques discussed herein. Accordingly, a wedge or Y connection between enhanced bar code scanner 208 , keyboard controller port 204 , and a computer keyboard is not required. However, if one wished to provide an additional input source to PC 200 , an optional computer keyboard could be provided. This optional keyboard could be connected, for example, using the Y or wedge type configuration shown in FIG. 1 .
- Enhanced bar code scanner 208 is “enhanced” in the sense that it is equipped with a keyboard emulation mechanism.
- This mechanism provides an interface to a keyboard port of a computing device such as a personal or laptop computer.
- the keyboard emulation mechanism may include software, firmware, and/or operating instructions.
- Use of the term “keyboard emulation mechanism” is not necessarily indicative of any hardware enhancements to the bar code scanner.
- the keyboard emulation mechanism eliminates the necessity of connecting an actual computer keyboard to the port by responding to the computing device's standard power-on diagnostic procedure as if it were effectively an electrical equivalent of a computer keyboard.
- the keyboard emulation mechanism of enhanced bar code scanner 208 is equipped to detect a keyboard inhibit signal at the keyboard controller port 204 .
- This inhibit signal may be generated by PC 200 ), and/or by any of a number of devices coupled to, and/or within this computing device.
- the inhibit signal may be generated by the PC pulling the clock line to a logic “low” state.
- the keyboard emulation mechanism would detect the existence of a keyboard inhibit signal by monitoring the clock line.
- the keyboard emulation mechanism detects a keyboard inhibit signal while a data byte is being transmitted to the keyboard controller port 204 , the keyboard emulation mechanism retransmits this data byte to the keyboard controller port 204 .
- This retransmission process is repeated up to a specified number of times, so as to provide additional opportunities for the data byte to be inputted to the keyboard controller port 204 if the port is momentarily disabled by the keyboard inhibit signal. For many applications, it is advantageous to repeat the retransmission process up to three times for a given data byte. If the data byte is still not successfully received after the third attempt, the process is no longer repeated.
- This data byte may represent one or more scan codes which, in turn, represent one or more keyboard key presses or decoded bar codes.
- the keyboard emulation mechanism keeps track of status indications transmitted by the computing device (in the example of FIG. 2, PC 200 ) and related to the status of one or more indicators on a computer keyboard. These indicators may be provided in the form of one or more LED lamps indicative of the status of the Caps-lock, Num-lock, and Scroll-lock keys.
- the keyboard emulation mechanism also keeps track of the transmission protocol currently in use, such as make-Break,Make-Only, AT or PS2-type scan-code transmission protocols. These status indications and transmission protocols may vary, depending upon the keyboard country type selected, and are maintained by the keyboard emulation mechanism so that the enhanced bar code scanner 208 will transmit accurately to PC 200 .
- the keyboard emulation mechanism may be provided in the form of enhanced software, firmware, and/or programming instructions.
- This software, firmware, and/or operating instructions can be configured for use with presently-existing keyboard wedge scanners, as well as any of various scanners which may be developed in the future.
- One purpose of the software, firmware, and/or operating instructions is to accurately transmit a bar code on a transmission line that is subjected to possible halt or inhibit signals issued by the computing device. It should be noted that any number of sources contained within the computing device could generate these inhibit signals.
- this byte which may represent all or part of a decoded bar code, is optionally displayed on a monitor coupled to the computing device.
- FIGS. 3A-3K which together comprise a flowchart setting forth a keyboard emulation method according to a preferred embodiment of the invention.
- the method is organized into a first sequence of steps related to power-up and diagnostics (blocks 301 - 304 ), a second sequence of steps related to the decoding and storing of data (blocks 305 - 306 ), a third sequence of steps related to keyboard output (blocks 307 - 308 ), a fourth sequence of steps related to ASCII to scan code conversion (blocks 309 - 311 ), a fifth sequence of steps related to preparation for a keyboard output sequence (blocks 312 - 317 ), a sixth sequence of steps related to first character keyboard initialization (blocks 318 - 322 ), a seventh sequence of steps related to keyboard scan code output (blocks 323 - 327 ), an eighth sequence of steps related to preparation for exiting the keyboard scan code transmission program (blocks 328 - 333 ), and a ninth sequence of steps related to
- the program of FIGS. 3A-3K commences at block 301 , where power is applied to enhanced bar code scanner ( 208 , FIG. 2) and/or PC ( 200 , FIG. 2)
- the program determines the operational mode of the enhanced bar code scanner.
- the operational mode is “normal” if the enhanced bar code scanner is to be used in a Y or wedge configuration with a computer keyboard, similar to the configuration of FIG. 1 .
- the mode is “stand-alone” if, as shown in FIG. 2, the enhanced bar code scanner is a “stand alone” unit not to be used with a separate computer keyboard. If the operational mode is “normal”, the program skips ahead to block 305 . Otherwise, the program proceeds to block 303 .
- the enhanced bar code scanner (FIG. 2) must communicate to PC 200 all command bytes for successful completion of power-on diagnostics.
- the enhanced bar code scanner begins this keyboard emulation process by transmitting an “AA” to indicate that the “keyboard” self-test was completed successfully.
- the PC and “keyboard” (as emulated by the enhanced bar code scanner) may communicate and acknowledge any of a number of various commands to complete the power-on diagnostic sequence.
- Some PC's require more information than others for the power-on diagnostic procedure. Therefore the number of commands sent by the PC and acknowledged by the emulated keyboard is variable. These commands may include any of the following: Typamatic Rate, Make/Break status, scan code set enabled, and LED status.
- the PC will power up normally. Note that powering up is sometimes referred to as “booting up”. Without successful completion of these commands, the PC will fail to power up. After the PC boots up, the enhanced bar code scanner is ready to decode data.
- bar code symbols are decoded into human-readable and/or ASCII characters which are then stored in a memory device associated with the enhanced bar code scanner, such as, for example, random-access memory (RAM).
- a memory device associated with the enhanced bar code scanner such as, for example, random-access memory (RAM).
- the program generates an appropriate output interface equipped to select output data from the enhanced bar code scanner.
- a test is performed at block 307 to determine the output mode of the emulated keyboard.
- Typical output modes include AT, XT, and PS 2 .
- the program determines the type of keyboard transmission that is to take place. Types of keyboard transmission include normal, ALT Mode, and special key transmission sequences.
- the program proceeds to blocks 310 & 311 . Otherwise, the program jumps ahead to block 312 .
- the country output setting of the keyboard is determined at block 310 . This country output setting specifies any of a plurality of keyboards, such as US (United States), UK (United Kingdom), FR (France), GR (Germany), BE (Belgium), SP (Spain), IT (Italy), and JP (Japan).
- an ASCII character of a bar code string received by the enhanced bar code scanner is converted to an equivalent scan code or keyboard key code for the particular keyboard type or country type determined at block 310 .
- the program proceeds (block 312 ) with the outputting of scan codes based on the keyboard type as previously determined at block 310 . Then, at block 313 , a test is performed to ascertain whether a “stand alone” (FIG. 2) or “normal keyboard wedge” configuration is in use.
- the “normal keyboard wedge” configuration is similar to FIG. 1, except that an enhanced bar code scanner is used in place of bar code scanner 108 .
- program control is routed to an appropriate operational sequence, depending upon the configuration in use as determined at block 313 . If a “normal keyboard wedge” configuration is in use, the program proceeds with blocks 315 , 316 , and 317 . Otherwise, the program jumps ahead to block 318 .
- a test is performed to ascertain whether message-based inhibit or character inhibit has been selected. If message inhibit has been selected, then the program skips ahead to block 318 . Otherwise, the program proceeds to block 316 .
- a test is performed at block 316 to check for any PC to keyboard communications currently taking place. If there are any currently active communications taking place, the program waits until any such communication has ended. Then (block 317 ), the keyboard is inhibited from the PC.
- This sequence commences by performing a test to determine whether or not a 1 st character of a scanner bar code transmission sequence has been sent by the enhanced bar code scanner (block 318 ). This scanner bar code transmission sequence is organized into a data byte, as previously described. If not, the program jumps ahead to block 323 . Otherwise, the program proceeds to block 319 , where a check is performed to determine whether or not normal keyboard transmission is required. If so, the program proceeds to block 320 . If not, the program jumps ahead to block 323 .
- a test is performed to determine if a European keyboard type (FR, GR, BE).is in use. If so, the program continues to block 321 . If not, the program jumps ahead to block 323 .
- a [SHIFT] is transmitted and the PC releases the keyboard inhibit so as to place the keyboard into a known (lower-case) operational state. The PC then re-enables the keyboard inhibit (block 322 ).
- the scanner will communicate with other system components as if it was a standalone bar code scanner. All communications, if any, that are required will be acknowledged by the bar code scanner.
- the output sequence specifies any of Normal, Alt Mode, and Special Key transmission. All of these modes require the transmission of keyboard scan codes.
- Alt mode transmits the decimal value of the ASCII value using the numeric keypad scan codes.
- Special Key transmissions are the transmission of non-ASCII keys (i.e. function keys—F 1 , F 2 , etc., arrow keys and so forth).
- Normal key transmission is the transmission of normal ASCII characters that have an associated keyboard scan code. All scan codes may be transmitted using the aforementioned “3 strikes technique” to output the data.
- the enhanced bar code scanner implements a keyboard scan code transmission (block 325 ) using a plurality of data bytes.
- a “MAKE” scan code followed by a 2 byte scan code BREAK sequence is transmitted. All 3 scan codes can use the “3 strikes” method.
- each keyboard scan code transmission is an 11-bit output sequence. Its format is as follows: Start bit ( 0 ), 8 data bits (scan code), parity bit (odd parity) and a stop bit ( 1 ). While transmitting the bits, the PC can halt the transmission of the scan code by pulling the keyboard clock or data line low.
- the keyboard may need to respond to the PC or wait until the lines go back to a ready-state and retransmit th e scan c ode , up to a predetermined maximum number of times. This predetermined number is three in cases where the “3 strikes technique” is employed.
- a test is again performed to ascertain whether a “stand alone” (FIG. 2) or “normal keyboard wedge” configuration is in use (block 328 ). If a Stand alone keyboard scanner is in ue, the program jumps ahead to block 334 . Otherwise, the program continues to block 329 , where the program checks for a Message Inhibit and a Character Inhibit. If a Character Inhibit exists, this inhibit is released, and the program jumps ahead to block 334 . If a Message Inhibit exists, the program advances to block 330 , where a check is performed to determine whether or not this is the last character of the message. If it is the last character , the program advances to block 331 whereas, if it is not., the program advances to block 334 .
- FIGS. 3A-3K has been organized into nine operational sequences for illustrative purposes and as an explanatory aid. Those skilled in the art can appreciate that the program need not necessarily be organized into nine operational sequences, as variations thereto are still within the spirit and scope of the invention.
- the keyboard emulation mechanism may include software, firmware, and/or operating instructions. Use of this term herein is not necessarily indicative of any hardware enhancements to the bar code scanner. If the scanner is programmed to allow for up to three retransmissions, such a method is referred to as the “3-strikes-technique”. A conventional transmission of one pressed key consists of three (3) characters—a make scan code and two (2) break code characters. Therefore, this technique could possibly transmit up to 9 characters to complete the key sequence. This retransmit technique gives the enhanced bar code scanner a limited number of retries per scan code, thus allowing a transmission sequence to move forward instead of hanging or sticking while trying to retransmit the same character over and over again.
- the retransmit protocol was developed after noticing that other devices or software within the PC could also inhibit the keyboard controller port. Some devices/software such as network drivers may inhibit the keyboard controller port every few milliseconds to perform some function without interrupt. Other devices, such as a mouse, may be on the same interrupt as the keyboard controller port, thus requiring the keyboard controller port to be inhibited while the software governing the mouse moves the mouse cursor. With laptops, the same types of inhibit issues can exist. However, even more restraints may be placed on the external keyboard controller port of a laptop than would be the case with a conventional PC. This renders use of the keyboard controller port as an auxiliary input channel all the more difficult in the operational environment of laptop computing.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
Description
Claims (36)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/614,356 US6540144B1 (en) | 1999-07-16 | 2000-07-12 | Techniques for interfacing a bar code scanner to a PC using a keyboard retransmit protocol |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14436199P | 1999-07-16 | 1999-07-16 | |
US09/614,356 US6540144B1 (en) | 1999-07-16 | 2000-07-12 | Techniques for interfacing a bar code scanner to a PC using a keyboard retransmit protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
US6540144B1 true US6540144B1 (en) | 2003-04-01 |
Family
ID=26841935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/614,356 Expired - Lifetime US6540144B1 (en) | 1999-07-16 | 2000-07-12 | Techniques for interfacing a bar code scanner to a PC using a keyboard retransmit protocol |
Country Status (1)
Country | Link |
---|---|
US (1) | US6540144B1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030087681A1 (en) * | 2001-10-25 | 2003-05-08 | William Sackett | Method of and arrangement for minimizing power consumption and data latency of an electro-optical reader in a wireless network |
US20050029356A1 (en) * | 2003-08-05 | 2005-02-10 | Didier Frantz | Scanner reader Active-X plug-in |
US20050167491A1 (en) * | 1998-02-17 | 2005-08-04 | Sia Yik H. | Code based access systems |
US6985954B1 (en) * | 1998-09-11 | 2006-01-10 | L. V. Partners, L.P. | Input device for allowing input of a unique digital code to a user's computer to control access thereof to a web site |
US20060034038A1 (en) * | 2004-08-11 | 2006-02-16 | Chunhong Hou | Including additional keys for mobile computers |
US20070250695A1 (en) * | 1998-09-11 | 2007-10-25 | Lv Partners, L.P. | Automatic configuration of equipment software |
US20080217392A1 (en) * | 2007-03-07 | 2008-09-11 | Welch Allyn, Inc. | Method for processing data from barcodes |
US20090119422A1 (en) * | 2007-11-07 | 2009-05-07 | International Business Machines Corporation | Method and apparatus for performing maintenance operations on peripheral devices |
US7739353B2 (en) | 1998-09-11 | 2010-06-15 | Rpx-Lv Acquisition Llc | Launching a web site using a personal device |
US7819316B2 (en) | 1998-09-11 | 2010-10-26 | Lv Partners, L.P. | Portable scanner for enabling automatic commerce transactions |
US7870189B2 (en) | 1998-09-11 | 2011-01-11 | Rpx-Lv Acquisition Llc | Input device having positional and scanning capabilities |
US7904344B2 (en) | 1998-09-11 | 2011-03-08 | Rpx-Lv Acquisition Llc | Accessing a vendor web site using personal account information retrieved from a credit card company web site |
US7925780B2 (en) | 1998-09-11 | 2011-04-12 | Rpx-Lv Acquisition Llc | Method for connecting a wireless device to a remote location on a network |
US7979576B2 (en) | 1998-09-11 | 2011-07-12 | Rpx-Lv Acquisition Llc | Method and apparatus for connecting a user location to one of a plurality of destination locations on a network |
US8005985B2 (en) | 1998-09-11 | 2011-08-23 | RPX—LV Acquisition LLC | Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet |
US8296440B2 (en) | 1998-09-11 | 2012-10-23 | Rpx Corporation | Method and apparatus for accessing a remote location with an optical reader having a programmable memory system |
EP2704361A3 (en) * | 2012-08-20 | 2015-12-23 | ADVA Optical Networking SE | Mobile terminal for maintenance of a telecommunication system |
US20190227645A1 (en) * | 2018-01-23 | 2019-07-25 | Corsair Memory, Inc. | Operation and control apparatus and control method |
CN112801652A (en) * | 2020-12-31 | 2021-05-14 | 网银在线(北京)科技有限公司 | Information processing method and device for scanning coded graphics |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5021640A (en) * | 1988-06-20 | 1991-06-04 | Tokyo Electric Co., Ltd. | Apparatus capable of being operated as both a bar code reading device and a manual keyboard |
US5178234A (en) | 1990-03-15 | 1993-01-12 | Tokyo Electric Co., Ltd. | Checkout apparatus |
JPH08328717A (en) * | 1995-06-05 | 1996-12-13 | Nippon Avionics Co Ltd | Keyboard with serial input interface |
US5848292A (en) * | 1996-06-19 | 1998-12-08 | Ncr Corporation | System for data transmission between a wedge microcontroller and a personal computer microcontroller by disconnecting the keyboard microcontroller and placing the same in hold state |
US5854945A (en) * | 1997-01-21 | 1998-12-29 | Opticon, Inc. | Bar code scanner with keyboard simulation |
US5875415A (en) | 1995-05-12 | 1999-02-23 | Symbol Technologies, Inc. | Universal host interface for data acquisition systems |
US6263383B1 (en) * | 1998-11-23 | 2001-07-17 | Glenn W. Lee | Keyboard wedge system configured for data processing over a keyboard hook |
US6312175B1 (en) * | 1998-03-31 | 2001-11-06 | Logic Controls, Inc. | Integrated keyboard input device |
-
2000
- 2000-07-12 US US09/614,356 patent/US6540144B1/en not_active Expired - Lifetime
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5021640A (en) * | 1988-06-20 | 1991-06-04 | Tokyo Electric Co., Ltd. | Apparatus capable of being operated as both a bar code reading device and a manual keyboard |
US5178234A (en) | 1990-03-15 | 1993-01-12 | Tokyo Electric Co., Ltd. | Checkout apparatus |
US5875415A (en) | 1995-05-12 | 1999-02-23 | Symbol Technologies, Inc. | Universal host interface for data acquisition systems |
JPH08328717A (en) * | 1995-06-05 | 1996-12-13 | Nippon Avionics Co Ltd | Keyboard with serial input interface |
US5848292A (en) * | 1996-06-19 | 1998-12-08 | Ncr Corporation | System for data transmission between a wedge microcontroller and a personal computer microcontroller by disconnecting the keyboard microcontroller and placing the same in hold state |
US5854945A (en) * | 1997-01-21 | 1998-12-29 | Opticon, Inc. | Bar code scanner with keyboard simulation |
US6312175B1 (en) * | 1998-03-31 | 2001-11-06 | Logic Controls, Inc. | Integrated keyboard input device |
US6263383B1 (en) * | 1998-11-23 | 2001-07-17 | Glenn W. Lee | Keyboard wedge system configured for data processing over a keyboard hook |
Non-Patent Citations (4)
Title |
---|
Copyright 1996 Information Access Company; Automatic I.D. News; Sep., 1996; p. 18; ISSN: 0890-9768. |
Copyright 1996 Information Access Company; Packaging Digest; May, 1996; vol. 33; No. 6; p. 34; ISSN: 0030-9117. |
MS900 by Metrologic Instruments, Inc.; Sep. 1998; www.metrologic.com. |
Symbol Technologies "ScanPlus Reference Manual" Edition 1.0 Apr., 1996, p. 4-39.* * |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070296546A1 (en) * | 1998-02-17 | 2007-12-27 | Sia Yik H | Code based access systems |
US20100327055A1 (en) * | 1998-02-17 | 2010-12-30 | Yik Hei Sia | Code Based Access Systems |
US20050167491A1 (en) * | 1998-02-17 | 2005-08-04 | Sia Yik H. | Code based access systems |
US7841518B2 (en) * | 1998-02-17 | 2010-11-30 | Yik Hei Sia | Code based access systems |
US7766226B2 (en) * | 1998-02-17 | 2010-08-03 | Yik Hei Sia | Code based access systems |
US20090212106A1 (en) * | 1998-02-17 | 2009-08-27 | Yik Hei Sia | Code based access systems |
US7267268B2 (en) * | 1998-02-17 | 2007-09-11 | Yik Hei Sia | Code based access systems |
US7822829B2 (en) | 1998-09-11 | 2010-10-26 | Rpx-Lv Acquisition Llc | Method for interfacing scanned product information with a source for the product over a global network |
US7979576B2 (en) | 1998-09-11 | 2011-07-12 | Rpx-Lv Acquisition Llc | Method and apparatus for connecting a user location to one of a plurality of destination locations on a network |
US8296440B2 (en) | 1998-09-11 | 2012-10-23 | Rpx Corporation | Method and apparatus for accessing a remote location with an optical reader having a programmable memory system |
US8069098B2 (en) | 1998-09-11 | 2011-11-29 | Rpx-Lv Acquisition Llc | Input device for allowing interface to a web site in association with a unique input code |
US8005985B2 (en) | 1998-09-11 | 2011-08-23 | RPX—LV Acquisition LLC | Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet |
US20070250695A1 (en) * | 1998-09-11 | 2007-10-25 | Lv Partners, L.P. | Automatic configuration of equipment software |
US7739353B2 (en) | 1998-09-11 | 2010-06-15 | Rpx-Lv Acquisition Llc | Launching a web site using a personal device |
US7925780B2 (en) | 1998-09-11 | 2011-04-12 | Rpx-Lv Acquisition Llc | Method for connecting a wireless device to a remote location on a network |
US7912961B2 (en) | 1998-09-11 | 2011-03-22 | Rpx-Lv Acquisition Llc | Input device for allowing input of unique digital code to a user's computer to control access thereof to a web site |
US7912760B2 (en) | 1998-09-11 | 2011-03-22 | Rpx-Lv Acquisition Llc | Method and apparatus for utilizing a unique transaction code to update a magazine subscription over the internet |
US7819316B2 (en) | 1998-09-11 | 2010-10-26 | Lv Partners, L.P. | Portable scanner for enabling automatic commerce transactions |
US6985954B1 (en) * | 1998-09-11 | 2006-01-10 | L. V. Partners, L.P. | Input device for allowing input of a unique digital code to a user's computer to control access thereof to a web site |
US7908467B2 (en) | 1998-09-11 | 2011-03-15 | RPX-LV Acquistion LLC | Automatic configuration of equipment software |
US7870189B2 (en) | 1998-09-11 | 2011-01-11 | Rpx-Lv Acquisition Llc | Input device having positional and scanning capabilities |
US7904344B2 (en) | 1998-09-11 | 2011-03-08 | Rpx-Lv Acquisition Llc | Accessing a vendor web site using personal account information retrieved from a credit card company web site |
US7047051B2 (en) * | 2001-10-25 | 2006-05-16 | Symbol Technologies, Inc. | Method of and arrangement for minimizing power consumption and data latency of an electro-optical reader in a wireless network |
US20030087681A1 (en) * | 2001-10-25 | 2003-05-08 | William Sackett | Method of and arrangement for minimizing power consumption and data latency of an electro-optical reader in a wireless network |
US20050029356A1 (en) * | 2003-08-05 | 2005-02-10 | Didier Frantz | Scanner reader Active-X plug-in |
US20060034038A1 (en) * | 2004-08-11 | 2006-02-16 | Chunhong Hou | Including additional keys for mobile computers |
WO2008109234A1 (en) * | 2007-03-07 | 2008-09-12 | Welch Allyn, Inc. | Method for processing data from barcodes |
US7770797B2 (en) | 2007-03-07 | 2010-08-10 | Welch Allyn, Inc. | Method for processing data from barcodes |
US20080217392A1 (en) * | 2007-03-07 | 2008-09-11 | Welch Allyn, Inc. | Method for processing data from barcodes |
US20090119422A1 (en) * | 2007-11-07 | 2009-05-07 | International Business Machines Corporation | Method and apparatus for performing maintenance operations on peripheral devices |
EP2704361A3 (en) * | 2012-08-20 | 2015-12-23 | ADVA Optical Networking SE | Mobile terminal for maintenance of a telecommunication system |
US20190227645A1 (en) * | 2018-01-23 | 2019-07-25 | Corsair Memory, Inc. | Operation and control apparatus and control method |
US10884516B2 (en) * | 2018-01-23 | 2021-01-05 | Corsair Memory, Inc. | Operation and control apparatus and control method |
CN112801652A (en) * | 2020-12-31 | 2021-05-14 | 网银在线(北京)科技有限公司 | Information processing method and device for scanning coded graphics |
CN112801652B (en) * | 2020-12-31 | 2024-05-17 | 网银在线(北京)科技有限公司 | Information processing method and apparatus for scanning encoded patterns |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6540144B1 (en) | Techniques for interfacing a bar code scanner to a PC using a keyboard retransmit protocol | |
EP0352028B1 (en) | Apparatus for transmitting data between a central processor and remote peripheral devices | |
US6536666B1 (en) | Techniques for interfacing a bar code scanner to a PC using a message-based and/or character-based keyboard inhibit | |
US4896289A (en) | Expansion interface board system for connecting several personal computers to an electronic typesetter connected to a host personal computer | |
US5991546A (en) | System and method for interfacing manually controllable input devices to a universal computer bus system | |
US5854945A (en) | Bar code scanner with keyboard simulation | |
JPH01152556A (en) | System allowing exchange of peripheral device | |
US20040010773A1 (en) | Method and apparatus for displaying debug codes of a baisc input/output system | |
EP3458967B1 (en) | Communication apparatus, communication method, program, and communication system | |
US6973598B2 (en) | Computer system with improved data capture system | |
EP0545828A2 (en) | Power source control apparatus for display unit | |
US20140244874A1 (en) | Restoring stability to an unstable bus | |
US20120331196A1 (en) | Restoring stability to an unstable bus | |
US10838510B2 (en) | Generating modified keyboard data received from a client device to reduce unintended key repetition | |
US5146584A (en) | Keyboard interface system allowing a synchronous keyboard to communicate with a host processor asynchronously by manipulating the keyboard clock's state | |
IE45210B1 (en) | A method of transmitting data in a communication network | |
CN101324868B (en) | Device for connecting processor and BOOT FLASH and implementing method | |
JP2829137B2 (en) | External keyboard connection confirmation device | |
JPS59173819A (en) | Input device | |
JP2738788B2 (en) | Data communication device | |
JP2941266B1 (en) | Encoder data output method for bus communication type encoder device | |
KR100328628B1 (en) | Handshaking method of passbook printer | |
JPH04104545A (en) | Operation part controller | |
JP2797756B2 (en) | Connection determination method for controlled devices | |
JPH0969849A (en) | Asynchronous communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNORS:METROLOGIC INSTRUMENTS, INC.;ADAPTIVE OPTICS ASSOCIATES, INC.;REEL/FRAME:011511/0142 Effective date: 20010108 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: METROLOGIC INSTRUMENTS, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:016026/0789 Effective date: 20041026 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MORGAN STANLEY & CO. INCORPORATED, NEW YORK Free format text: FIRST LIEN IP SECURITY AGREEMENT;ASSIGNORS:METROLOGIC INSTRUMENTS, INC.;METEOR HOLDING CORP.;OMNIPLANAR, INC.;REEL/FRAME:018942/0315 Effective date: 20061221 Owner name: MORGAN STANLEY & CO. INCORPORATED, NEW YORK Free format text: SECOND LIEN IP SECURITY AGREEMENT;ASSIGNORS:METROLOGIC INSTRUMENTS, INC.;METEOR HOLDING CORP.;OMNIPLANAR, INC.;REEL/FRAME:018942/0671 Effective date: 20061221 Owner name: MORGAN STANLEY & CO. INCORPORATED,NEW YORK Free format text: FIRST LIEN IP SECURITY AGREEMENT;ASSIGNORS:METROLOGIC INSTRUMENTS, INC.;METEOR HOLDING CORP.;OMNIPLANAR, INC.;REEL/FRAME:018942/0315 Effective date: 20061221 Owner name: MORGAN STANLEY & CO. INCORPORATED,NEW YORK Free format text: SECOND LIEN IP SECURITY AGREEMENT;ASSIGNORS:METROLOGIC INSTRUMENTS, INC.;METEOR HOLDING CORP.;OMNIPLANAR, INC.;REEL/FRAME:018942/0671 Effective date: 20061221 |
|
AS | Assignment |
Owner name: METROLOGIC INSTRUMENTS, INC., NEW JERSEY Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0754 Effective date: 20080701 Owner name: METEOR HOLDING CORPORATION, NEW JERSEY Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0754 Effective date: 20080701 Owner name: OMNIPLANAR, INC., NEW JERSEY Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0754 Effective date: 20080701 Owner name: METROLOGIC INSTRUMENTS, INC., NEW JERSEY Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0809 Effective date: 20080701 Owner name: METEOR HOLDING CORPORATION, NEW JERSEY Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0809 Effective date: 20080701 Owner name: OMNIPLANAR, INC., NEW JERSEY Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0809 Effective date: 20080701 Owner name: METROLOGIC INSTRUMENTS, INC.,NEW JERSEY Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0754 Effective date: 20080701 Owner name: METEOR HOLDING CORPORATION,NEW JERSEY Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0754 Effective date: 20080701 Owner name: OMNIPLANAR, INC.,NEW JERSEY Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0754 Effective date: 20080701 Owner name: METROLOGIC INSTRUMENTS, INC.,NEW JERSEY Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0809 Effective date: 20080701 Owner name: METEOR HOLDING CORPORATION,NEW JERSEY Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0809 Effective date: 20080701 Owner name: OMNIPLANAR, INC.,NEW JERSEY Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT RELEASE;ASSIGNOR:MORGAN STANLEY & CO. INCORPORATED;REEL/FRAME:023085/0809 Effective date: 20080701 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |